Sadly, it may possibly with MD5. The truth is, again in 2004, researchers managed to develop two various inputs that gave a similar MD5 hash. This vulnerability could be exploited by lousy actors to sneak in malicious facts. It was created by Ronald Rivest in 1991 and is mainly used https://angelolrrpn.blogoxo.com/34176184/facts-about-what-is-md5-technology-revealed